HOME     MENU     SEARCH     NEWSLETTER    
THE ENTERPRISE SECURITY SUPERSITE. UPDATED 10 MINUTES AGO.
You are here: Home / Network Security / Stuxnet Hit on Utility Signals New Era
Neustar, Inc.
Protect your website & network using real-time information & analysis
www.neustar.biz
Stuxnet Strike on U.S. Utility Signals Disturbing Trend
Stuxnet Strike on U.S. Utility Signals Disturbing Trend
By Mark Long / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
NOVEMBER
21
2011

U.S. security experts say a variant of the Stuxnet computer worm caused the destruction of a water pump at a public utility in Springfield, Ill., last week. Discovered in June of last year, Stuxnet targets the Windows-based supervisory control and data acquisition (SCADA) systems developed by Siemens to control and monitor specific industrial processes.

Though the destruction of a pump might not seem like such a big deal, there are oil pipelines, power plants, large communication systems, airports, ships and even military installations around the world using similar control systems. An earlier cyber attack targeting a control system at a hydroelectric facility in Russia killed more than 70 people in 2009.

The potential threats posed by cyber warfare are only outranked by nuclear bombs and other weapons of mass destruction, warned Gen. Keith Alexander, the commander of U.S. Cyber Command and director of the National Security Agency.

"When you look at the vulnerabilities that we face in this area, it's extraordinary," Alexander said earlier this month. "What we see is a disturbing trend -- from exploitation to disruption to destruction."

A New Cyber Arms Race

What's worse, Stuxnet may merely be the prototype for more powerful next-generation cyber weapons that ultimately will make the Web the new battleground in an ever-widening arms race.

"In the past there were just cyber criminals," said Kaspersky Lab CEO Eugene Kaspersky. "Now I am afraid it is the time of cyber terrorism, cyber weapons and cyber wars," he warned the security industry in a speech delivered in November of last year.

The first known Stuxnet variants uncovered were specifically aimed at Iran-based organizations with probable ties to the nation's nuclear energy program. The sophistication of the worm's coding and other factors have led computer security experts to believe that Stuxnet was a state-sponsored worm specifically constructed for conducting cyber warfare.

"This piece of malware was designed to sabotage plants, to damage industrial systems," Kaspersky said.

Protective Measures

Last week the worm turned, and this time the target was an industrial installation in the United States. According to Applied Control Systems cyber security expert Joseph Weiss, it appears that the attack on the Illinois water utility had actually been under way for weeks prior to the pump's destruction.

"Minor glitches were observed in remote access to the SCADA system for two to three months before it was identified as a cyber attack," Weiss wrote in a blog. "It is believed the SCADA software vendor was hacked and customer usernames and passwords stolen."

To protect U.S. military installations, the U.S. Defense Department is evaluating a possible move to more-secure cloud computing environments, which would prevent foreign adversaries from targeting any single computer server.

As part of a more dynamic perimeter defense network, Alexander is also considering the creation of special "hunter teams" that could actively seek out and defuse potential cyber threats before they actually cause damage.

Tell Us What You Think
Comment:

Name:

Jack:
Posted: 2011-11-29 @ 7:52am PT
Hoax.

admingal.com:
Posted: 2011-11-21 @ 4:04pm PT
Water plan used a 3-character password, this was not cyber-terrorism...

Steve Anderson:
Posted: 2011-11-21 @ 3:42pm PT
How did it destroy a water pump???

The story sucks, give real details.

Its like a S/W designer, NO Value! NO details!

Was the code written in COBOL???

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Forrester study shows 187% ROI with Druva Endpoint Backup: In a commissioned study conducted by Forrester Consulting on behalf of Druva, Forrester found that the costs and benefits for a composite organization with 3,000 inSync users, based on customer interviews, are: 1) 187% return on investment, and 2) Total cost savings and benefits of $3.8 million. Click here to access the study now.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
The FBI is pointing the finger of blame for the Sony Pictures cyberattack directly at North Korea. The hackers stole confidential data and caused the movie giant to can its new comic film, "The Interview."

ENTERPRISE HARDWARE SPOTLIGHT
Almost half of consumer, industry and life sciences manufacturers are expected to be using 3D printers within three years and now 3D printing services are aiming to help companies experiment.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.